rrec
memcpy(&(s->s3->rrec), &(rdata->rrec), sizeof(SSL3_RECORD_INTERNAL));
memcpy(&(rdata->rrec), &(s->s3->rrec), sizeof(SSL3_RECORD_INTERNAL));
memset(&(s->s3->rrec), 0, sizeof(SSL3_RECORD_INTERNAL));
s->s3->rrec.epoch = tls_content_epoch(s->s3->rcontent);
SSL3_RECORD_INTERNAL *rr = &(s->s3->rrec);
SSL3_RECORD_INTERNAL *rr = &(s->s3->rrec);
s->s3->rrec.length = 0;
s->s3->rrec.length = 0;
s->s3->rrec.length = 0;
s->s3->rrec.length = 0;
s->s3->rrec.seq_num) < 0) {
s->s3->rrec.length = 0;
s->s3->rrec.length = 0;
s->s3->rrec.length = 0;
SSL3_RECORD_INTERNAL rrec;
SSL3_RECORD_INTERNAL rrec; /* each decoded record goes in here */
s->s3->rrec.length = 0;
s->s3->rrec.length = 0;
SSL3_RECORD_INTERNAL *rr = &(s->s3->rrec);
ssl3_cbc_copy_mac(mac, &rrec, mac_len, rrec.length +
rrec.padding_length);
rrec.length -= mac_len;
seq_num, rrec.input, rrec.length, mac_len,
rrec.padding_length))
rrec.length -= mac_len;
memcpy(mac, rrec.data + rrec.length, mac_len);
seq_num, rrec.input, rrec.length))
if (rrec.length > SSL3_RT_MAX_COMPRESSED_LENGTH + mac_len) {
if (rrec.length > SSL3_RT_MAX_PLAIN_LENGTH) {
if (!tls_content_set_bounds(out, eiv_len, rrec.length))
SSL3_RECORD_INTERNAL rrec;
memset(&rrec, 0, sizeof(rrec));
rrec.data = content;
rrec.input = content;
rrec.length = content_len;
ssl3_cbc_remove_padding(&rrec, eiv_len, mac_len);
s->s3->rrec.type = SSL3_RT_HANDSHAKE;
s->s3->rrec.length = CBS_len(&cbs);
tls13_record_free(rl->rrec);
rl->rrec = NULL;
if (!tls13_record_content(rl->rrec, &cbs))
tls13_record_content_type(rl->rrec), CBS_data(&cbs), CBS_len(&cbs)))
if (!tls13_record_header(rl->rrec, &header))
if (!tls13_record_content(rl->rrec, &enc_record))
if (rl->rrec == NULL) {
if ((rl->rrec = tls13_record_new()) == NULL)
struct tls13_record *rrec;
if ((ret = tls13_record_recv(rl->rrec, rl->cb.wire_read, rl->cb_arg)) <= 0) {
content_type = tls13_record_content_type(rl->rrec);
tls13_record_version(rl->rrec) != TLS1_2_VERSION &&
if (!tls13_record_content(rl->rrec, &cbs))